Vulnerability Description
FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain complete persistent access to the local system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fruitywifi Project | Fruitywifi | <= 2.4 |
Related Weaknesses (CWE)
References
- https://gist.github.com/harsh-bothra/5be73cfd53f1c5bea307c702ae83ff42Broken Link
- https://github.com/xtr4nge/FruityWifi/issues/278ExploitIssue TrackingThird Party Advisory
- https://gist.github.com/harsh-bothra/5be73cfd53f1c5bea307c702ae83ff42Broken Link
- https://github.com/xtr4nge/FruityWifi/issues/278ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2020-24848?
CVE-2020-24848 is a vulnerability with a CVSS score of 7.8 (HIGH). FruityWifi through 2.4 has an unsafe Sudo configuration [(ALL : ALL) NOPASSWD: ALL]. This allows an attacker to perform a system-level (root) local privilege escalation, allowing an attacker to gain c...
How severe is CVE-2020-24848?
CVE-2020-24848 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-24848?
Check the references section above for vendor advisories and patch information. Affected products include: Fruitywifi Project Fruitywifi.